You are on page 1of 3

Scanning Commands

Sr
Commands Description Example
No
Normal Commands
nmap –p- targetipaddress
nmap –p- 192.168.0.22
or
or
nmap –p portname ipaddress
nmap –p ftp 192.168.0.22
or
or
1 nmap –p portname,portname Show all ports in result
nmap –p ftp,ssh 192.168.0.22
ipaddress
or
or
nmap –p 21,22 192.168.0.22
nmap –p portnumber,portnumber
ip_address
nmap –p(portno) targetipaddress Show particular port information nmap –p47 192.168.0.22
2
nmap –p(range) targetipaddress Show Particular port range information nmap –p1-100 192.168.0.22
3 nmap –h Help Information nmap –h
4 nmap –sU targetipaddress Udp port Information nmap –sU 192.168.0.22
5 nmap –sU –p U:153,111 ipaddress
Aggressive Scan(Port,Script,Traceroute,os
6 nmap –A targetipaddress nmap –A 192.168.0.22
discovery )
7 nmap –Pn targetipaddress block icmp packet / off host discovery nmap –Pn 192.168.0.22

nmap ipaddress/subnetmask All Device Port Check or Scan Subnet nmap 192.168.0.22/24
or or or
8 nmap ipaddress-range Scan Particular Range ip nmap 192.168.0.1-30
or or or
nmap ipaddress >/>> filename Save port result nmap 192.168.0.1 > Sam.txt

Input from list of hosts/networks


9 nmap –iL inputfilename nmap –iL Sam.txt
it is used to scan ip in a file

10 nmap -F ip_address It is used to fast scan nmap -F 192.168.43.174

11 hping3 –flood ipaddress It is used to hang device hping3 –flood 192.168.43.174

Scanning Technique Commands

nmap –sn Live Host find out nmap –sn


1
targetipaddress/subnetmask first task in scanning 192.168.0.36/subnetmask

find port using three way handshake/Tcp


scan/full open scan
2 nmap –sT targetipaddress in the scan connection built nmap –sT 192.168.0.36
In the scan log generated
Second Task in open ports first scan
Stealth Scan connection not built up
3 nmap –sS targetipaddress in the scan log not generated nmap –sS 192.168.0.36
Second Task in open ports Second Scan

Ack Scan used to check firewall present or


not
4 nmap –sA targetipaddress In the scan filtered means firewall present nmap –sA 192.168.0.36
and unfiltered means firewall absent
Second Task in open ports Third Scan

X-mas Scan used to check port open or


close
in the scan server not response means
5 nmap –sX targetipaddress nmap –sX 192.168.0.36
port open and server response means port
close
Second Task in open ports Fourth Scan

nmap –sI spoofipaddress Zombie Scan attacker connect to target nmap –sI 192.168.0.1
6
targetipaddress with the help of other person 192.168.0.36 –e eth0

Service Version Scan check version of


ports ( it means software of port or same
7 nmap –sV targetipaddress nmap –sV 192.168.0.36
as android version )
Third Task in Scanning

OS Scan to find which os run in system


8 nmap –O targetipaddress nmap –O 192.168.0.36
Fourth Task in Scanning

Vulnerability found in service version


through find out ( it means search service
9 nmap –sV targetipaddress version and type vulnerability and show nmap –sV 192.168.0.36
result ) sitename=cvedetails.com
fifth task in scanning

10 nmap –A targetipaddress Aggressive Scan in scan many information nmap –A 192.168.0.36

Evading Firewall / Firewall ids Bypass Techniques

nmap –D RND:number nmap –D RND:3 192.168.0.36


Source Routing Scan if attacker attack
targetipaddress or
target machine but target firewall block
or nmap –D 192.168.0.18
attacker flag then we used source routing .
nmap –D ipaddress targetipaddress 192.168.0.20 192.168.0.22
1 in the techniques attacker attack through
or 192.168.0.36
target system access user then used this
nmap –D ipaddress –p(range) or
user to send packet to target
targetipaddress nmap –D 192.168.0.18 –p1-
100 192.168.0.36
Fragmentation Scan attacker send data in
nmap –f 192.168.0.36
nmap –f targetipaddress the form of bit of data and send means (
or
2 or Data is Syn = in the case send in the form =
nmap –f –p1-100
nmap –f –p(range) targetipaddress S = y = n ) this form data send
192.168.0.36

IP Spoofing Scan attacker stolen another


nmap –S spoofipaddress person identity and perform attack to nmap –S 192.168.0.1
3
targetipaddress –e eth0/wlan0 victim 192.168.0.36 –e eth0

Notes

1. Nmap –sX –p21 192.168.0.26 --reason

You might also like